AAPT subject of data breach
- 26 July, 2012 16:09
Internet service provider (ISP), AAPT, has confirmed that it was the target of a data breach which affected some AAPT business customer data stored on servers in Melbourne.
AAPT CEO, David Yuile, said in a statement that the incident was brought to its attention by service provider, Melbourne IT, at approximately 9:30pm (AEST) last night.
“Preliminary findings suggest it was two files that were compromised and the data is historic, with limited personal customer information,” he said.
“Further, the servers on which the files were stored have not been used or connected to AAPT for at least 12 months.”
Hacktivst group, Anonymous, which had threatened to release 40GB of data from an ISP in protest over the Australian Government’s proposed data retention laws--which could mean every internet users' entire Web history is logged and stored for up to two years--posted a message on its Par:AnoIA Twitter account:
“Apparently rumors are spreading much already. Let us point the attention to this link: http://en.wikipedia.org/wiki/AAPT.”
Operation Australia recently tweeted, “We can promise you. That the leak is not fake. We know, and the certain ISP knows.”
IBRS analyst, James Turner, told CIO Australia that the issue for AAPT is that an alleged group of hackers is attacking a third party and then claiming the attack is a political statement.
“It's like stealing an individual's car and then saying it was a protest against the number of red light cameras,” he said.
“Whoever committed this attack clearly hadn't thought through what they were doing, and certainly not why they were doing it. This attack actually helps support the government's case.”
According to Turner, attacks against civilians, or in this case an unrelated organisation, merely galvanises the Australian Government’s resolve to not be beaten.
“It’s likely that public support for ISPs being made to track user activity will actually increase -- as a direct result of this attack.”
Earlier in the week, Anonymous claimed credit for taking down at least 10 Queensland government websites in protest over the proposed data retention rules.
According to a blog posting entitled Par:Onia members of the group used an authentication bypass to loot some “booty” from Queensland government servers which, according to Anonymous, showed how the Australian government was monitoring citizen's activity online.
Follow Hamish Barwick on Twitter: @HamishBarwick
Follow CIO Australia on Twitter: @CIO_Australia
Join the CIO Australia group on LinkedIn. The group is open to CIOs, IT Directors, COOs, CTOs and senior IT managers.
Why IT projects really fail
Queensland government to provide 200 services online by 2015
Call Centers Suffer From Big Data Overload
CIO 100: Carsales wins top gong for innovation
How to secure passwords and other critical numbers
Leveraging DCIM Software
Business executives are challenging their IT staffs to convert costly data centres into producers of business value. Only with higher visibility, more control and improved automation of reporting systems can help deliver on this commitment. Holistic management capabilities available today can enable data centre professionals to maximize their capacity to control their energy costs and to advise the business on how to utilize IT assets more effectively. This paper demonstrates how data centre infrastructure management (DCIM) software tools can simplify operational processes, cut costs, and speed up information delivery.
Mobility Apps: What every developer should know
Learn how others have delivered industry-leading, multi-platform management and security solutions. In this whitepaper, we look how app developers can develop, deploy and manage apps that enterprises can rely on today and into the future. Click to download!
Unleashing the Power of Information
If business-relevant information is not well managed, secured and analysed, it can become an underutilized asset or—worst case—a legal and competitive liability. Nearly all of the IT and business executives who responded to a recent survey recognise this risk, and say they understand the importance of having an enterprise information management (EIM) strategy. Find out more on how to reduce costs, improve competitiveness and avoid risk by making information management an enterprisewide strategic priority.